وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CISM – Certified Information Security Manager Full Training

سرفصل های دوره

Prepare for ISACA CISM Exam


1. Course Introduction
  • 1. Meet the Instructor
  • 2. Have a Question Here how to get in touch
  • 3. Rating is Caring
  • 4. Getting the Course Completion Certificate

  • 2. Security Foundations for Security Managers
  • 1. CIA Triad and the Security Objectives
  • 2. Privacy and Security
  • 3. Cyber Kill Chain
  • 4. Cyber Attacks
  • 5. MiTM
  • 6. Malware and Cyber Threats
  • 7. Password Attacks and Rainbow Tables

  • 3. Domain 1 - Security Governance
  • 1. Security Manager Roles
  • 2. Organisational Structure
  • 3. Why Information Security Governance
  • 4. Governance vs Management
  • 5. RACI Matrix
  • 6. Data Owner and Data Custodian
  • 7. Strategy, Goals and Business Alignment
  • 8. Data LifeCycle
  • 9. Data Retention and Disposal
  • 10. Legal regulations and Standards
  • 11. Maturity Assessment Models and PDCA
  • 12. Governance Frameworks
  • 13. IT Balanced Score Card
  • 14. Polices
  • 15. Example of Policies
  • 16. Standards
  • 17. Policies and Standards Review
  • 18. Procedures and Guidelines
  • 19. Security Investment - CAPEX and OPEX, ROI & ROSI
  • 20. Portfolio and Financial Management

  • 4. Domain 2 - Risk Management
  • 1. Risk Management Overview
  • 2. Types of Risk
  • 3. Risk Analysis Evaluation
  • 4. Risk Response
  • 5. Risk Monitoring
  • 6. Key Risk Indicators
  • 7. Risk Management Frameworks
  • 8. Security Controls
  • 9. Types of Security Controls
  • 10. Control Objective
  • 11. Control Objective
  • 12. Controls Assessment and Defence in Depth
  • 13. Understand the Security Layers in Corporate Networks
  • 14. Network Security using Segmentation
  • 15. Firewalls and IPS
  • 16. DMZ and Bastian Host
  • 17. Proxy, Load Balance and Email Security
  • 18. Network Access Control
  • 19. Endpoint Protection Platform

  • 5. Domain 3 - Security Program Development
  • 1. Business Case
  • 2. Enterprise Architecture
  • 3. Social Engineering
  • 4. Security Awareness
  • 5. Personnel Security Measures
  • 6. Software Development Methodologies
  • 7. Secure Coding and Software Development Best Practices
  • 8. DevOps
  • 9. DevSecOps
  • 10. Security Testing and Assessment
  • 11. Security Testing and Assessment - SAST, DAST, SCA
  • 12. Threat Model Overview
  • 13. Threat Model - STRIDE and DREAD
  • 14. AAA Overview
  • 15. MFA and Bio metric Authentication
  • 16. Cryptography Overview
  • 17. Symmetric Encryption
  • 18. Asymmetric Encryption
  • 19. Asymmetric Encryption Use Cases
  • 20. Digital Signature
  • 21. Hashing
  • 22. Public Key Infrastructure
  • 23. Outsourcing and Third Party Management
  • 24. Supply Chain Risk Management
  • 25. System Organization Controls - SOC Audit and Report
  • 26. Physical Security and Facility Design
  • 27. Physical Access Controls
  • 28. CCTV and Facility Monitoring
  • 29. Data and Perimeter Security
  • 30. Securing Power Sources
  • 31. Fire Suppression System

  • 6. Domain 4 - Incident Response and Manageent
  • 1. Incident Management Overview
  • 2. Forensic Investigation and Evidence Collection
  • 3. Problem Management
  • 4. Incident Response Testing and Evaluation
  • 5. Incident Response Training
  • 6. What is Disasters and What is BIA
  • 7. Disaster Recovery Plan
  • 8. Business Continuity Plan
  • 9. Developing BCP and DRP
  • 10. RPO and RTO
  • 11. AIW, SDO, MTO
  • 12. RTO, RPO, MTO relations
  • 13. Recovery Strategies
  • 14. Reciprocal Agreement
  • 15. Testing and Evaluating the BCP and DRP
  • 16. Data Backup
  • 17. Backup Types
  • 18. SOC
  • 19. SIEM
  • 20. EDR and NDR
  • 21. XDR and SOAR
  • 22. Vulnerability Assessment Software
  • 23. Threat Intelligence and MITRE Framework
  • 24. Help Desk and Ticketing System
  • 25. Change Management Overview
  • 26. Types of Changes
  • 27. Configuration Management
  • 28. Patch Management
  • 29. Release Management
  • 30. Virtualisation Concepts
  • 31. Cloud Computing Overview
  • 32. Containerisation Technology and Server-less Computing

  • 7. What is Next
  • 1. Register and Appear for the CISM Exam.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 19007
    حجم: 4956 مگابایت
    مدت زمان: 885 دقیقه
    تاریخ انتشار: 20 شهریور 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید